Fake SMS : Skip Phone Verification By Using A Proxy

4 years ago

Fake SMS is a simple command line tool using which you can skip phone number based SMS verification by using…

10 Best SEO plugin for WordPress WooCommerce

4 years ago

SEO plugins are the best way to boost WordPress WooCommerce websites in search engines like Google, Yahoo, and Bing. The best…

WdToggle : Direct System Calls To Enable WDigest Credential Caching

4 years ago

WdToggle is a Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls to enable WDigest credential…

Gatekeeper : First Open-Source DDoS Protection System

4 years ago

Gatekeeper is the first open source DoS protection system. It is designed to scale to any peak bandwidth, so it…

Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

4 years ago

Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently,…

OpenWifiPass : An Open Source Implementation Of Apple’s Wi-Fi Password

4 years ago

OpenWifiPass open source implementation of the grantor role in Apple's Wi-Fi Password Sharing protocol. Requirements Hardware: Bluetooth Low Energy radio,…

5 Best Online Cyber Security Courses

4 years ago

Over the years, technology has advanced and evolved, with more enterprises moving to online platforms. However, with this evolution, the…

GitLab Watchman : Monitoring GitLab For Sensitive Data Shared Publicly

4 years ago

GitLab Watchman is an application that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally.…

Understanding the Desktop as a Service Model

4 years ago

You may have heard of software as a service before, which some people abbreviate as SaaS. Not as many people…

OSV : Open Source Vulnerabilities

4 years ago

OSV is a vulnerability database and triage infrastructure for open source projects aimed at helping both open source maintainers and…